Article history: Available online 4 March 2013 Keywords: Information systems ed to information nalyzing vulnera- risk to an plex and d stems. The any single vulnerability…